04-04-2023 11:11 PM
Hello,
I have a customer that need to replace their obsolete Microsoft Direct Access RAVPN and are looking for a solution that is transparent for the users and also as secure as possible.
They have the following requirements for the new RAVPN solution
At first, they thought they should migrate to Microsoft Always On, since it’s the official replacement for Direct Access, but they have security concerns because of the fact that the only thing required to connect is a valid machine certificate on the client.
The fear is therefore that a machine certificate can go astray without the customer knowledge and that an unauthorized client then has the opportunity to connect to the VPN.
They have therefore started investigating AnyConnect as a potential replacement and maybe use the ISE posture feature for an extra protection mechanism. The idea here is that the client would need both the certificate and – for example – a specific Windows registry key before the client are considered compliant and can access the environment.
The customer is however a bit concerned about the increased technical complexity of using ISE posture and this would also entails a significant cost in the form of ISE posture licenses.
Furthermore, I am unsure whether ISE Posturing can be combined with the other requirements, and more specifically SBL.
Would the Posturing module actually would work before the user has logged in? If posture cannot work with SLB, the posture function will be pointless.
So would you say that AnyConnect with just a machine certificates is secure enough without other secondary security measures like ISE posture or MFA?
According to this post it seems like it’s not that difficult to steel a certificate and then import it to another computer
https://www.tommacdonald.co.uk/stealing-cisco-vpn-certificates/
Would like to hear your thoughts and suggestions.
Thanks
/Chess
04-04-2023 11:28 PM
if you need high security and it is concerned, then i suggest to go with ISE posturing too.
04-04-2023 11:58 PM
Hi,
There's no right or bad answer. It all depends on the security needs, policies, level of trust that a company wants to adhere to.
Usually, considering that PKI is AD integrated, you have to use a domain computer in order to get network access be it 802.1x or VPN, because only domain computers have machine certificates, due to GPO being applied only to these.
It's just a matter of perspective, because you can find cons to almost any combination/method of network access. Regarding the use of mimikatz, you'd have to assume that admin rights are not available to regular users, so you don't just download mimikatz and 'let's follow that tutorial'.
Nowadays, best way to provide access (generally speaking) is by using MFA/2FA but I don't see how you can use that and retain what Direct Access provided.
Going back to your issue, from my point of view, Direct Access can be replaced by Anyconnect using:
BR,
Octavian
04-05-2023 02:18 AM
Thank you Octavian for taking the time with this helpful answer.
I will have a closer look at AnyConnect management tunnel, because it's seems to offer the transparency my client require.
Normally we I use to implement AnyConnect with DUO or other MFA solutions, but user transparency is really important in this case.
Thanks
/Chess
04-12-2023 04:36 PM
Hi @Chess Norris , with machine cert authentication for Secure Client ( Formerly Anyconnect ) , you can use Secure Client Posture (Formerly Hostscan) and configured DAP policies on Headend to check for User Compliance before allowing to connect and access corporate resource if you are concerned about technical complexity using ISE posture . This would also go well with SBL/Always on Feature .
04-12-2023 06:53 PM
"Normally we I use to implement AnyConnect with DUO or other MFA solutions, but user transparency is really important in this case."
One of Duo's main goals is user experience @Chess Norris. Since you are designing a new solution you should consider passwordless, I recommend this documentary: https://duo.com/solutions/passwordless/the-life-and-death-of-passwords
Here at Cisco our VPN experience is seamless, Duo still checks for posture and makes sure the device is properly managed without sending the end user a Duo Push, you can read about our own implementation here: https://blogs.cisco.com/ciscoit/cisco-vpn-goes-passwordless-to-save-time-boost-security
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide